default search action
Journal of Cyber Security and Mobility, Volume 5
Volume 5, Number 1, January 2016
- Yagiz Kaymak, Roberto Rojas-Cessa:
Packet-Based Load Balancing in Data Center Networks. 1-18 - Pranela Rameshwar:
The Economic Impact in Biosecurity Breach - The Perspective of a Translational Scientist. 19-22 - Ihab Darwish, Obinna Igbe, Tarek N. Saadawi:
Vulnerability Assessment and Experimentation of Smart Grid DNP3. 23-54 - Vandana Milind Rohokale, Ramjee Prasad:
Cyber Security for Smart Grid - The Backbone of Social Economy. 55-76
Volume 5, Number 2, 2016
- Rodrigo Ruiz, Rogério Winter:
Lazarus: Data Leakage with PGP and Resurrection of the Revoked User. 1-14 - Daniel Spiekermann, Tobias Eggendorfer:
Challenges of Network Forensic Investigation in Virtual Networks. 15-46 - Abdullah J. Alzahrani, Ali A. Ghorbani:
SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents. 47-74
Volume 5, Number 3, July 2016
- Ramadhan J. Mstafa, Khaled M. Elleithy:
An ECC/DCT-Based Robust Video Steganography Algorithm for Secure Data Communication. 167-194 - Nikita Veshchikov, Stephane Fernandes Medeiros, Liran Lerman:
Variety of Scalable Shuffling Countermeasures against Side Channel Attacks. 195-232 - Chayapol Kamyod, Rasmus Hjorth Nielsen, Neeli Rashmi Prasad, Ramjee Prasad, Nattapol Aunsri:
End-to-End Reliability and Optimization of Intra and Inter-Domain IMS-based Communication Networks. 233-256
Volume 5, Number 4, October 2016
- Raja Muthalagu, Subeen Jain:
Modifying LFSR of ZUC to Reduce Time for Key-Stream Generation. 257-268 - Konstantin Böttinger:
Chemotactic Test Case Recombinationfor Large-Scale Fuzzing. 269-286 - Jeroen van der Ham, Roland van Rijswijk-Deij:
Ethics and Internet Measurements. 287-308
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.